Managed File Transfer

Size: px
Start display at page:

Download "Managed File Transfer"

Transcription

1 Managed File Transfer In many organizations a large part of the exchange and distribution of information is realized by the copy and transfer of data files. As the number of files is ever increasing, the results are serious management and security issues. These issues are predominantly operational, so awareness at management level is typically low. Consider the following use cases. For years, corporations have been moving from bespoke to standard software: traditional locally installed packages or cloud delivered SAAS packages. Generally, standard software does not allow access to data directly but instead provides an application layer interface. For bulk transfers, the service / message style interfaces perform poorly, so file-based interfaces are common for these kinds of transfers. Files often contain the right information in the wrong format. Rather than script file changes and build an unmanageable library of scripts there is a need for a Managed File Transfer (MFT) product. Recent trends lead to more data being stored in files: - Hadoop s HDFS provides scalable, sheer unlimited capacity to store any files. Partly due to the limitations to update files history is often stored in completely separate files. - More and more applications generate or use rich content like media (photos, videos) which is also commonly stored. Corporations often use workplace software like SharePoint to formalize desktop processes and information. To link these processes to transactional systems there is a requirement to integrate these systems with workplace & office files, and with that the need for MFT. A SharePoint frontend on a transactional system also eliminates all kinds of unwanted direct access to business applications. Challenges FTP is a commonly used file transfer protocol but it offers no guarantees in delivery of files. To ensure delivery additional scripting is needed. As a result, every file transfer needs its own script, the number of scripts explodes and the environment becomes unmanageable. Creating a script is easy, maintaining and operating it is not. To address those issues, organizations sometimes deploy a file exchange platform to manage these scripts. Due to the nature of scripting, this platform (often not more than a server with storage and lots of scripting) soon becomes a management nightmare itself. Most of the scripting is not documented, it is often unknown what exactly is happening and no real management is possible. Whenever there is an interruption, fixing scripts involves reverse engineering, long downtimes and even hacking. When file transfer to customers or partners and with that external transfers become necessary, the file exchange platform is often duplicated to the DMZ. Now there is not only a management problem, but also a security risk. The end result is a deadly combination of high costs and high risks. Managed file transfer HVR Software, December 2014 Page 1

2 HVR for MFT HVR provides Managed File Transfer functionality. This can be used as a tool in its own right, but also as part of the integrated HVR suite for enterprise data integration. Complex file transfer chains can be configured, scheduled and controlled from a central point on an enterprise-wide level. HVR supports 3 types of file transfer: file-to-file, database-to-file and file-to-database. File-to-file transfer An HVR file-to-file transfer will copy the files from one file location (the source location) to one or more other file locations (the target locations). A file location is a directory or a tree of directories, which can either be accessed through the local file system (Unix, Linux or Windows) or through a network file protocol (FTP, FTPs, sftp or WebDAV). Files can be copied or moved. In the latter case, the files on the source location are deleted after they have been copied to the target locations. The file contents are normally preserved, but it is possible to include file transformations in the copy process using external commands or definitions defined in an XSLT file. To distribute sets of files HVR provides the possibility to copy files selectively from the source location by matching their names to a predefined pattern. This feature also enables the routing of files within the same source location to different target locations on the basis of their file names to enable selective file distribution scenarios. File-to-database transfer In a file-to-database transfer data will be read from files in the source file location and replicated into one or more target databases. The source files are by default expected to be in a specific HVR XML format, which contains the table information required to determine to which tables and rows the changes should be written in the target database. It is also possible to use other input file formats by including an additional transformation step in the file capture. Support for CSV is available out-of-the-box, but any format can be handled by providing an external command or an XSLT definition. Database-to-file transfer In a database-to-file transfer the data is read from a source database and copied into one or more files on the source file location. By default the resulting files are in the HVR XML format preserving the table information. However, CSV is also supported out-of-the-box and other file formats can be created by including an additional transformation command or XSLT definition in the file output. As in the Continuous Database Replication between databases, it is possible to select specific tables and rows form the source database and convert names and column values. Managed file transfer HVR Software, December 2014 Page 2

3 Advanced scenarios HVR s flexible architecture and seamless file integration make a combination of various scenarios also possible. For example combining distribution and conversion into a database distribution & file conversion channel. HVR s flexible architecture enables interchanging all kinds of scenarios easily! HVR Managed File Transfer shares underlying data transport architecture with database refresh and replication, taking advantage of common features such as continuous data streaming, data compression and network encryption. As a result HVR MFT is optimized for maximum performance, efficiency and scalability making very effective use of network resources. It can easily handle multi-gigabyte files sent in a single task to or from 100 or more locations. Supported sources Supported targets Oracle, all editions, including Amazon RDS All supported sources SQL Server, all editions, including Azure Teradata DB2 on Linux, Unix and Windows Actian Vector (Vectorwise) Ingres Actian Matrix (ParAccel) Flat files Pivotal Greenplum SharePoint Pivotal Hawq ftp locations Amazon Redshift Hadoop (hdfs) HVR s MFT capabilities Setting up HVR is done from HVR s easy to use GUI. The GUI exposes all options to the user in easy dialogs. The GUI also shows the commands needed to perform the same actions on the command line for scripting as well. Finally, the GUI is directly linked to HVR s help system through context-sensitive help. The first step is to define physical locations for files. These locations can be local or remote. Local locations are just locations on your file system (a directory). Remote locations exists in 2 flavors: connecting to a remote HVR agent accessing its file system or connect through an external protocol. The former uses HVR s built in protocol, ensuring optimal performance and reliability Managed file transfer HVR Software, December 2014 Page 3

4 Figure 1 Setting up a remote file location However, in certain cases, only external protocols are available. HVR allows you to connect through webdav or (s)ftp(s). You ll have to provide the credentials and set the necessary options (encryption, port, etc.). The advantage of using these protocols with HVR rather than in scripting is the monitoring and managing capabilities HVR adds. The next step is setting up a transfer, in HVR terms a Channel. A channel can contain various types of locations (database or file). In the case of MFT, there are file locations involved. If there is no data structure in the channel definition (e.g. a table layout) then HVR handles files as BLOBs. BLOBs can be of any format and transported anywhere, but they cannot be transformed. If the user adds structure to a channel by defining table structures then HVR treats files as containing this structure (in XML or CSV format). In this case HVR can manipulate the data in the files. Figure 2 Defining table structure defines file structure as well Should you wish to handle structured and unstructured data together, you can create 2 separate channels sharing the locations, one with table structures defined, one without. Managed file transfer HVR Software, December 2014 Page 4

5 In order to define what has to be done in a channel, you have to define Actions in the channel. Every channel needs an action for the source and an action for the target: the FileCapture and FileIntegrate respectively. Defining Location behavior The Action FileCapture is used to instruct HVR to capture files from a file location and to control its behavior. Figure 3 Action FileCapture Defining the action is sufficient to start replication. You can however taylor it to your needs by setting options. Use the /DeleteAfterCapture option to move files instead of copying them. The /Pattern and /IgnorePattern options control what files are picked up and ignored by HVR. For example, pickup all files called *.xml and ignore all files with tmp in it (*tmp*). More powerful expressions are possible. There are multiple ways to control the handshake between the process that creates the file and HVR picking it up. Ideally the creation of a file is an atomic process, e.g. by moving it to the capture location when the file is complete. Alternatively, the /IngoreUnterminated option can be used for HVR to wait until a termination expression is written to a file (e.g. EOF). /AccessDelay forces HVR to wait for a certain amount of time before processing a file. This can be used when writing the file is guaranteed to finish in a certain amount of time. The /UseDirectoryTime option can be used in conjunction with touching the directory date when done writing. For the target file locations, the FileIntegrate action has to be set: Figure 4 Action FileIntegrate Again, setting it is enough to commence transfer of files. However, several options can be controlled. Managed file transfer HVR Software, December 2014 Page 5

6 /ErrorOnOverwrite controls whether overwrites are allowed or not. Overwrites would normally only happen when the source file is being altered and HVR has to retransfer it. The parameter /RenameExpression allows the user to perform rename operations with regular expressions. You can also add variables like a timestamp to filenames (which can be used to prevent overwrites from happening). /MaxFileSize will split files accordingly, it is normally only used on structured files containing data. /Journal enables journaling, /HVROpField adds an operation field, enabling deletes to be written as well. This is usefull in database / file combinations. /ConvertNewLines controls Dos/Unix newline conversion and /OnErrorSaveFailed will save the error induced files to a different location, making the transfer more resilient by not aborting it. HVR s advanced options When more is needed than a 1-1 file transfer, HVR s advanced actions are to be called in. To transform files, the action Transform is available within HVR. Figure 5 Action Transform In this action, it is possible to add transformations. HVR supports a number of different transformation mechanisms. HVR has some transformations buit-in like: Softdeletes (transforming a deletion indication to items representing a a delete XML <=> CSV Tokenize (call an external token service to encrypt a value) Fike2Column (load a file into a database column) On top of that HVR allows you to add an XSLT style sheet performing the transformation and finally allows you to write you own conversion script and control it from HVR. This also allows you to interface with another application directly. A popular use case for external transformations is the use of HVR in conjunction with an ETL tool. For these scenarios it often makes sense to use the /HVROpField parameter in conjunction with the Command option in antransformation action. Using multiple transformation actions is also possible. You can define the Transform action multiple times and can control their sequence with the /order option. Managed file transfer HVR Software, December 2014 Page 6

7 For advanced option on capture and integrate location, an action LocationProperties can be used in conjunction with FileCapture and/or FileIntegrate Figure 6 Defining LocationProperties It enables you to encrypt the connection to the location (/SslCertificate), connect through a proxy (/Proxy) and throttle the used bandwidth (/ThrottleKbytes and /ThrottleMillisecs). For read only locations, the creation of temporary files is impossible. However, HVR normally creates a subdirectory State for all locations into or out of which HVR writes or reads. This location can be overridden in the action LocationProperties with the /StateDirectory parameter. Managed file transfer HVR Software, December 2014 Page 7

How to Implement Multi-way Active/Active Replication SIMPLY

How to Implement Multi-way Active/Active Replication SIMPLY How to Implement Multi-way Active/Active Replication SIMPLY The easiest way to ensure data is always up to date in a 24x7 environment is to use a single global database. This approach works well if your

More information

Real-time High Volume Data Replication White Paper

Real-time High Volume Data Replication White Paper Real-time High Volume Data Replication White Paper Version 2.4 Table of Contents 1 HVR overview... 3 1.1 HVR Usage Scenarios... 4 1.2 Product Overview... 7 2 Technology... 9 2.1 Architecture and Key Capabilities...

More information

IBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, 2015. Integration Guide IBM

IBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, 2015. Integration Guide IBM IBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, 2015 Integration Guide IBM Note Before using this information and the product it supports, read the information in Notices on page 93.

More information

IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016. Integration Guide IBM

IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016. Integration Guide IBM IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016 Integration Guide IBM Note Before using this information and the product it supports, read the information

More information

Deploy. Friction-free self-service BI solutions for everyone Scalable analytics on a modern architecture

Deploy. Friction-free self-service BI solutions for everyone Scalable analytics on a modern architecture Friction-free self-service BI solutions for everyone Scalable analytics on a modern architecture Apps and data source extensions with APIs Future white label, embed or integrate Power BI Deploy Intelligent

More information

Sisense. Product Highlights. www.sisense.com

Sisense. Product Highlights. www.sisense.com Sisense Product Highlights Introduction Sisense is a business intelligence solution that simplifies analytics for complex data by offering an end-to-end platform that lets users easily prepare and analyze

More information

WhiteWave's Integrated Managed File Transfer (MFT)

WhiteWave's Integrated Managed File Transfer (MFT) WhiteWave's Integrated Managed File Transfer (MFT) Spotlight on webmethods ActiveTransfer Scott Jaynes ecommerce Architect, WhiteWave Foods Ramesh Venkat Director, Product Management, Software AG 10/17/12

More information

New Features in Neuron ESB 2.6

New Features in Neuron ESB 2.6 New Features in Neuron ESB 2.6 This release significantly extends the Neuron ESB platform by introducing new capabilities that will allow businesses to more easily scale, develop, connect and operationally

More information

DiskPulse DISK CHANGE MONITOR

DiskPulse DISK CHANGE MONITOR DiskPulse DISK CHANGE MONITOR User Manual Version 7.9 Oct 2015 www.diskpulse.com [email protected] 1 1 DiskPulse Overview...3 2 DiskPulse Product Versions...5 3 Using Desktop Product Version...6 3.1 Product

More information

Bootstrap guide for the File Station

Bootstrap guide for the File Station Bootstrap guide for the File Station Introduction Through the File Server it is possible to store files and create automated backups on a reliable, redundant storage system. NOTE: this guide considers

More information

Data processing goes big

Data processing goes big Test report: Integration Big Data Edition Data processing goes big Dr. Götz Güttich Integration is a powerful set of tools to access, transform, move and synchronize data. With more than 450 connectors,

More information

Using RD Gateway with Azure Multifactor Authentication

Using RD Gateway with Azure Multifactor Authentication Using RD Gateway with Azure Multifactor Authentication We have a client that uses RD Gateway to allow users to access their RDS deployment from outside their corporate network. They have about 1000+ users.

More information

How To Load Data Into An Org Database Cloud Service - Multitenant Edition

How To Load Data Into An Org Database Cloud Service - Multitenant Edition An Oracle White Paper June 2014 Data Movement and the Oracle Database Cloud Service Multitenant Edition 1 Table of Contents Introduction to data loading... 3 Data loading options... 4 Application Express...

More information

Architecture and Mode of Operation

Architecture and Mode of Operation Software- und Organisations-Service Open Source Scheduler Architecture and Mode of Operation Software- und Organisations-Service GmbH www.sos-berlin.com Scheduler worldwide Open Source Users and Commercial

More information

Data Security and Governance with Enterprise Enabler

Data Security and Governance with Enterprise Enabler Copyright 2014 Stone Bond Technologies, L.P. All rights reserved. The information contained in this document represents the current view of Stone Bond Technologies on the issue discussed as of the date

More information

Assignment # 1 (Cloud Computing Security)

Assignment # 1 (Cloud Computing Security) Assignment # 1 (Cloud Computing Security) Group Members: Abdullah Abid Zeeshan Qaiser M. Umar Hayat Table of Contents Windows Azure Introduction... 4 Windows Azure Services... 4 1. Compute... 4 a) Virtual

More information

Actian Analytics Platform Express Hadoop SQL Edition 2.0

Actian Analytics Platform Express Hadoop SQL Edition 2.0 Actian Analytics Platform Express Hadoop SQL Edition 2.0 Tutorial AH-2-TU-05 This Documentation is for the end user's informational purposes only and may be subject to change or withdrawal by Actian Corporation

More information

Mobile Admin Architecture

Mobile Admin Architecture Mobile Admin Architecture Introduction Mobile Admin is an enterprise-ready IT Management solution that enables system administrators to monitor and manage their corporate IT infrastructure from a mobile

More information

Cloudera Backup and Disaster Recovery

Cloudera Backup and Disaster Recovery Cloudera Backup and Disaster Recovery Important Note: Cloudera Manager 4 and CDH 4 have reached End of Maintenance (EOM) on August 9, 2015. Cloudera will not support or provide patches for any of the Cloudera

More information

Enhanced Connector Applications SupportPac VP01 for IBM WebSphere Business Events 3.0.0

Enhanced Connector Applications SupportPac VP01 for IBM WebSphere Business Events 3.0.0 Enhanced Connector Applications SupportPac VP01 for IBM WebSphere Business Events 3.0.0 Third edition (May 2012). Copyright International Business Machines Corporation 2012. US Government Users Restricted

More information

SOSFTP Managed File Transfer

SOSFTP Managed File Transfer Open Source File Transfer SOSFTP Managed File Transfer http://sosftp.sourceforge.net Table of Contents n Introduction to Managed File Transfer n Gaps n Solutions n Architecture and Components n SOSFTP

More information

Comparing Microsoft SQL Server 2005 Replication and DataXtend Remote Edition for Mobile and Distributed Applications

Comparing Microsoft SQL Server 2005 Replication and DataXtend Remote Edition for Mobile and Distributed Applications Comparing Microsoft SQL Server 2005 Replication and DataXtend Remote Edition for Mobile and Distributed Applications White Paper Table of Contents Overview...3 Replication Types Supported...3 Set-up &

More information

Introduction. KLS Backup 2011. Program Overview

Introduction. KLS Backup 2011. Program Overview Introduction Program Overview is a powerful backup, synchronization and disk cleaner program that allows you to back up or synchronize your data to local and network drives, cloud storage, CD/DVD disc,

More information

CASHNet Secure File Transfer Instructions

CASHNet Secure File Transfer Instructions CASHNet Secure File Transfer Instructions Copyright 2009, 2010 Higher One Payments, Inc. CASHNet, CASHNet Business Office, CASHNet Commerce Center, CASHNet SMARTPAY and all related logos and designs are

More information

Centralized Disaster Recovery using RDS

Centralized Disaster Recovery using RDS Centralized Disaster Recovery using RDS RDS is a cross-platform, scheduled replication application. Using RDS s replication and scheduling capabilities, a Centralized Disaster Recovery model may be used

More information

How To Use Attix5 Pro For A Fraction Of The Cost Of A Backup

How To Use Attix5 Pro For A Fraction Of The Cost Of A Backup Service Overview Business Cloud Backup Techgate s Business Cloud Backup service is a secure, fully automated set and forget solution, powered by Attix5, and is ideal for organisations with limited in-house

More information

Background on Elastic Compute Cloud (EC2) AMI s to choose from including servers hosted on different Linux distros

Background on Elastic Compute Cloud (EC2) AMI s to choose from including servers hosted on different Linux distros David Moses January 2014 Paper on Cloud Computing I Background on Tools and Technologies in Amazon Web Services (AWS) In this paper I will highlight the technologies from the AWS cloud which enable you

More information

Qlik Sense Enabling the New Enterprise

Qlik Sense Enabling the New Enterprise Technical Brief Qlik Sense Enabling the New Enterprise Generations of Business Intelligence The evolution of the BI market can be described as a series of disruptions. Each change occurred when a technology

More information

Managed File Transfer with Universal File Mover

Managed File Transfer with Universal File Mover Managed File Transfer with Universal File Mover Roger Lacroix [email protected] http://www.capitalware.com Universal File Mover Overview Universal File Mover (UFM) allows the user to combine

More information

Powerful Management of Financial Big Data

Powerful Management of Financial Big Data Powerful Management of Financial Big Data TickSmith s solutions are the first to apply the processing power, speed, and capacity of cutting-edge Big Data technology to financial data. We combine open source

More information

Course 20533: Implementing Microsoft Azure Infrastructure Solutions

Course 20533: Implementing Microsoft Azure Infrastructure Solutions Course 20533: Implementing Microsoft Azure Infrastructure Solutions Overview About this course This course is aimed at experienced IT Professionals who currently administer their on-premises infrastructure.

More information

Herve Roggero 3/3/2015

Herve Roggero 3/3/2015 BLUE SYNTAX CONSULTING Enzo Cloud Backup Overview Herve Roggero 3/3/2015 Contents General Technical Overview... 3 Operation Modes... 3 Enzo Agent... 4 Running Multiple Enzo Agents... 4 How to deploy...

More information

AWS Schema Conversion Tool. User Guide Version 1.0

AWS Schema Conversion Tool. User Guide Version 1.0 AWS Schema Conversion Tool User Guide AWS Schema Conversion Tool: User Guide Copyright 2016 Amazon Web Services, Inc. and/or its affiliates. All rights reserved. Amazon's trademarks and trade dress may

More information

Managed File Transfer

Managed File Transfer Managed File Transfer How do most organizations move files today? FTP Typically File Transfer Protocol (FTP) is combined with writing and maintaining homegrown code to address its limitations Limited Reliability

More information

KEMP LoadMaster. Enabling Hybrid Cloud Solutions in Microsoft Azure

KEMP LoadMaster. Enabling Hybrid Cloud Solutions in Microsoft Azure KEMP LoadMaster Enabling Hybrid Cloud Solutions in Microsoft Azure Introduction An increasing number of organizations are moving from traditional on-premises datacenter architecture to a public cloud platform

More information

WinSCP for Windows: Using SFTP to upload files to a server

WinSCP for Windows: Using SFTP to upload files to a server WinSCP for Windows: Using SFTP to upload files to a server Quickstart guide Developed by: Academic Technology Services & User Support, CIT atc.cit.cornell.edu Last updated 9/9/08 WinSCP 4.1.6 Getting started

More information

Please note that a username and password will be made available upon request. These are necessary to transfer files.

Please note that a username and password will be made available upon request. These are necessary to transfer files. Transferring Data Using Secure File Transfer Process ASU Center for Health Information and Research (CHiR) data partners can now securely electronically send their data submissions by means of Secure File

More information

DMZ Gateways: Secret Weapons for Data Security

DMZ Gateways: Secret Weapons for Data Security A L I N O M A S O F T W A R E W H I T E P A P E R DMZ Gateways: Secret Weapons for Data Security A L I N O M A S O F T W A R E W H I T E P A P E R DMZ Gateways: Secret Weapons for Data Security EXECUTIVE

More information

SECURE YOUR DATA EXCHANGE WITH SAFE-T BOX

SECURE YOUR DATA EXCHANGE WITH SAFE-T BOX SECURE YOUR DATA EXCHANGE SAFE-T BOX WHITE PAPER Safe-T. Smart Security Made Simple. 1 The Costs of Uncontrolled Data Exchange 2 Safe-T Box Secure Data Exchange Platform 2.1 Business Applications and Data

More information

User's Guide. Product Version: 2.5.0 Publication Date: 7/25/2011

User's Guide. Product Version: 2.5.0 Publication Date: 7/25/2011 User's Guide Product Version: 2.5.0 Publication Date: 7/25/2011 Copyright 2009-2011, LINOMA SOFTWARE LINOMA SOFTWARE is a division of LINOMA GROUP, Inc. Contents GoAnywhere Services Welcome 6 Getting Started

More information

ibolt V3.2 Release Notes

ibolt V3.2 Release Notes ibolt V3.2 Release Notes Welcome to ibolt V3.2, which has been designed to deliver an easy-touse, flexible, and cost-effective business integration solution. This document highlights the new and enhanced

More information

SQUEEZE SERVER. Operation Guide Version 3.0

SQUEEZE SERVER. Operation Guide Version 3.0 SQUEEZE SERVER Operation Guide Version 3.0 CONTENTS Introduction to Squeeze Server... 1 Features... 2 Squeeze Server Components... 3 How Squeeze Server Works... 4 Running Squeeze Server... 5 Priority Job

More information

Cloudera Backup and Disaster Recovery

Cloudera Backup and Disaster Recovery Cloudera Backup and Disaster Recovery Important Notice (c) 2010-2013 Cloudera, Inc. All rights reserved. Cloudera, the Cloudera logo, Cloudera Impala, and any other product or service names or slogans

More information

Implementing Microsoft Azure Infrastructure Solutions

Implementing Microsoft Azure Infrastructure Solutions Course Code: M20533 Vendor: Microsoft Course Overview Duration: 5 RRP: 2,025 Implementing Microsoft Azure Infrastructure Solutions Overview This course is aimed at experienced IT Professionals who currently

More information

Implementing Microsoft Azure Infrastructure Solutions 20533B; 5 Days, Instructor-led

Implementing Microsoft Azure Infrastructure Solutions 20533B; 5 Days, Instructor-led Implementing Microsoft Azure Infrastructure Solutions 20533B; 5 Days, Instructor-led Course Description This course is aimed at experienced IT Professionals who currently administer their on-premises infrastructure.

More information

Dynamics CRM 2011. with Azure and SharePoint a perfect match. Central and Eastern Europe

Dynamics CRM 2011. with Azure and SharePoint a perfect match. Central and Eastern Europe Central and Eastern Europe Dynamics CRM 2011 with Azure and SharePoint a perfect match Almut Tadsen Dynamics ISV Developer Evangelist [email protected] Agenda for today Azure Execute your out of CRM

More information

Course 20533B: Implementing Microsoft Azure Infrastructure Solutions

Course 20533B: Implementing Microsoft Azure Infrastructure Solutions Course 20533B: Implementing Microsoft Azure Infrastructure Solutions Sales 406/256-5700 Support 406/252-4959 Fax 406/256-0201 Evergreen Center North 1501 14 th St West, Suite 201 Billings, MT 59102 Course

More information

AvePoint DocAve Online vs Office 365 - SharePoint Online Management

AvePoint DocAve Online vs Office 365 - SharePoint Online Management AvePoint DocAve Online vs Office 365 - Management Overview: DocAve Online is a multi-tenant Software as a Service (SaaS) offering from AvePoint, hosted on Microsoft s Azure Platform as a Service (PaaS)

More information

Viking VPN Guide Linux/UNIX

Viking VPN Guide Linux/UNIX Viking VPN Guide Linux/UNIX Table Of Contents 1 : VPN Questions answered 2 : Installing the Linux Client 3 : Connecting with the Linux Client 4 : Reporting Problems Version 1.0 : 10/27/2010 Information

More information

Introducing the Reimagined Power BI Platform. Jen Underwood, Microsoft

Introducing the Reimagined Power BI Platform. Jen Underwood, Microsoft Introducing the Reimagined Power BI Platform Jen Underwood, Microsoft Thank You Sponsors Empower users with new insights through familiar tools while balancing the need for IT to monitor and manage user

More information

Moxa Device Manager 2.3 User s Manual

Moxa Device Manager 2.3 User s Manual User s Manual Third Edition, March 2011 www.moxa.com/product 2011 Moxa Inc. All rights reserved. User s Manual The software described in this manual is furnished under a license agreement and may be used

More information

Harnessing the Power of the Microsoft Cloud for Deep Data Analytics

Harnessing the Power of the Microsoft Cloud for Deep Data Analytics 1 Harnessing the Power of the Microsoft Cloud for Deep Data Analytics Today's Focus How you can operate your business more efficiently and effectively by tapping into Cloud based data analytics solutions

More information

FAQ. Hosted Data Disaster Protection

FAQ. Hosted Data Disaster Protection Hosted Data Disaster Protection Flexiion is based in the UK and delivers Infrastructure as a Service (IaaS) solutions, making the advantages of the Cloud and IaaS more accessible to mid-size, professional

More information

Gladinet Cloud Backup V3.0 User Guide

Gladinet Cloud Backup V3.0 User Guide Gladinet Cloud Backup V3.0 User Guide Foreword The Gladinet User Guide gives step-by-step instructions for end users. Revision History Gladinet User Guide Date Description Version 8/20/2010 Draft Gladinet

More information

Skybot Scheduler Release Notes

Skybot Scheduler Release Notes Skybot Scheduler Release Notes The following is a list of new features and enhancements included in each release of Skybot Scheduler. Skybot Scheduler 3.3 Oracle interface The new Skybot Scheduler Oracle

More information

EVault for Data Protection Manager. Course 361 Protecting Linux and UNIX with EVault

EVault for Data Protection Manager. Course 361 Protecting Linux and UNIX with EVault EVault for Data Protection Manager Course 361 Protecting Linux and UNIX with EVault Table of Contents Objectives... 3 Scenario... 3 Estimated Time to Complete This Lab... 3 Requirements for This Lab...

More information

Backup Exec Private Cloud Services. Planning and Deployment Guide

Backup Exec Private Cloud Services. Planning and Deployment Guide Backup Exec Private Cloud Services Planning and Deployment Guide Chapter 1 Introducing Backup Exec Private Cloud Services This chapter includes the following topics: About Backup Exec Private Cloud Services

More information

QLIKVIEW AND THE CLOUD

QLIKVIEW AND THE CLOUD QLIKVIEW AND THE CLOUD A QlikView Technology White Paper July 2012 qlikview.com Table of Contents Overview 4 Who Is This Paper For? 4 Cloud Terminology and QlikView 5 Software as a Service - SaaS 6 QlikView

More information

Two new DB2 Web Query options expand Microsoft integration As printed in the September 2009 edition of the IBM Systems Magazine

Two new DB2 Web Query options expand Microsoft integration As printed in the September 2009 edition of the IBM Systems Magazine Answering the Call Two new DB2 Web Query options expand Microsoft integration As printed in the September 2009 edition of the IBM Systems Magazine Written by Robert Andrews [email protected] End-user

More information

AvePoint DocAve Online vs Office 365 - SharePoint Online Management

AvePoint DocAve Online vs Office 365 - SharePoint Online Management AvePoint DocAve Online vs Management Overview: DocAve Online is a multi-tenant Software as a Service (SaaS) offering from AvePoint, hosted on Microsoft s Azure Platform as a Service (PaaS) technology.

More information

DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services

DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services DEPLOYMENT GUIDE Version 1.0 Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services Table of Contents Table of Contents Using the BIG-IP Edge Gateway for layered security and

More information

openft Enterprise File Transfer Copyright 2011 FUJITSU

openft Enterprise File Transfer Copyright 2011 FUJITSU openft Enterprise File Transfer Introduction 1 Enterprise File Transfer openft Ready to Transfer your Business Critical Data 2 openft in a nutshell openft is a high-performance solution for enterprise-wide

More information

THE WINDOWS AZURE PROGRAMMING MODEL

THE WINDOWS AZURE PROGRAMMING MODEL THE WINDOWS AZURE PROGRAMMING MODEL DAVID CHAPPELL OCTOBER 2010 SPONSORED BY MICROSOFT CORPORATION CONTENTS Why Create a New Programming Model?... 3 The Three Rules of the Windows Azure Programming Model...

More information

DocAve 6 High Availability

DocAve 6 High Availability DocAve 6 High Availability User Guide Service Pack 6 Issued October 2015 1 Table of Contents What s New in This Guide... 6 About DocAve High Availability... 7 Submitting Documentation Feedback to AvePoint...

More information

fåíéêåéí=péêîéê=^çãáåáëíê~íçêûë=dìáçé

fåíéêåéí=péêîéê=^çãáåáëíê~íçêûë=dìáçé fåíéêåéí=péêîéê=^çãáåáëíê~íçêûë=dìáçé Internet Server FileXpress Internet Server Administrator s Guide Version 7.2.1 Version 7.2.2 Created on 29 May, 2014 2014 Attachmate Corporation and its licensors.

More information

IM and Presence Disaster Recovery System

IM and Presence Disaster Recovery System Disaster Recovery System, page 1 Access the Disaster Recovery System, page 2 Back up data in the Disaster Recovery System, page 3 Restore scenarios, page 9 Backup and restore history, page 15 Data authentication

More information

Access Database Hosting. An introduction to Cloud Hosting Access databases from Your Office Anywhere

Access Database Hosting. An introduction to Cloud Hosting Access databases from Your Office Anywhere Access Database Hosting An introduction to Cloud Hosting Access databases from Your Office Anywhere Microsoft Access is a powerful way of creating bespoke database applications for either your own business

More information

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG) SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG) A RSACCESS WHITE PAPER 1 Microsoft Forefront Unified Access Gateway Overview 2 Safe-T RSAccess Secure Front-end Overview

More information

SOLUTIONS INC. BACK-IT UP. Online Backup Solution

SOLUTIONS INC. BACK-IT UP. Online Backup Solution SOLUTIONS INC. Online Backup Solution Data loss is a nightmare Your data is growing exponentially 1MB of data is worth US$10,000 If you find yourself now in a situation where you have to deal with an explosion

More information

Deploying BitDefender Client Security and BitDefender Windows Server Solutions

Deploying BitDefender Client Security and BitDefender Windows Server Solutions Deploying BitDefender Client Security and BitDefender Windows Server Solutions Quick Install Guide Copyright 2010 BitDefender; 1. Installation Overview Thank you for selecting BitDefender Business Solutions

More information

Installation and Setup: Setup Wizard Account Information

Installation and Setup: Setup Wizard Account Information Installation and Setup: Setup Wizard Account Information Once the My Secure Backup software has been installed on the end-user machine, the first step in the installation wizard is to configure their account

More information

CA ARCserve Backup for Windows

CA ARCserve Backup for Windows CA ARCserve Backup for Windows Agent for Microsoft SharePoint Server Guide r15 This documentation and any related computer software help programs (hereinafter referred to as the "Documentation") are for

More information

Simple Solution. Brighter Futures. TSDS Technical Course Module 3: Loading Data Using the DTU

Simple Solution. Brighter Futures. TSDS Technical Course Module 3: Loading Data Using the DTU Simple Solution. Brighter Futures. TSDS Technical Course Module 3: Loading Data Using the DTU Click Course to Menu edit Master title style 2 Process Map Overview File Preparation DTU Overview DTU On Demand

More information

Laptop Backup - Administrator Guide (Windows)

Laptop Backup - Administrator Guide (Windows) Laptop Backup - Administrator Guide (Windows) Page 1 of 86 Page 2 of 86 Laptop Backup - Administrator Guide (Windows) TABLE OF CONTENTS OVERVIEW PREPARE COMMCELL SETUP FIREWALL USING PROXY SETUP FIREWALL

More information

GlobalSCAPE DMZ Gateway, v1. User Guide

GlobalSCAPE DMZ Gateway, v1. User Guide GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical

More information

Improving Your Relationship with SAS Enterprise Guide

Improving Your Relationship with SAS Enterprise Guide Paper BI06-2013 Improving Your Relationship with SAS Enterprise Guide Jennifer Bjurstrom, SAS Institute Inc. ABSTRACT SAS Enterprise Guide has proven to be a very beneficial tool for both novice and experienced

More information

Big data variety, 179 velocity, 179 volume, 179 Blob storage containers

Big data variety, 179 velocity, 179 volume, 179 Blob storage containers Index A AADRM. See Azure active directory rights management (AADRM) AADRM PowerShell module Azure AD module, 164 Connect-AadrmService cmdlet, 164 Connect-MsolService cmdlet, 164 PowerShell v2.0 and.net

More information

New Features... 1 Installation... 3 Upgrade Changes... 3 Fixed Limitations... 4 Known Limitations... 5 Informatica Global Customer Support...

New Features... 1 Installation... 3 Upgrade Changes... 3 Fixed Limitations... 4 Known Limitations... 5 Informatica Global Customer Support... Informatica Corporation B2B Data Exchange Version 9.5.0 Release Notes June 2012 Copyright (c) 2006-2012 Informatica Corporation. All rights reserved. Contents New Features... 1 Installation... 3 Upgrade

More information

SharePoint Integration Framework Developers Cookbook

SharePoint Integration Framework Developers Cookbook Sitecore CMS 6.3 to 6.6 and SIP 3.2 SharePoint Integration Framework Developers Cookbook Rev: 2013-11-28 Sitecore CMS 6.3 to 6.6 and SIP 3.2 SharePoint Integration Framework Developers Cookbook A Guide

More information

Oracle Managed File Getting Started - Transfer FTP Server to File Table of Contents

Oracle Managed File Getting Started - Transfer FTP Server to File Table of Contents Oracle Managed File Getting Started - Transfer FTP Server to File Table of Contents Goals... 3 High- Level Steps... 4 Basic FTP to File with Compression... 4 Steps in Detail... 4 MFT Console: Login and

More information

Jeremy Kashel Tim Kent Martyn Bullerwell. Chapter No.2 "Master Data Services Overview"

Jeremy Kashel Tim Kent Martyn Bullerwell. Chapter No.2 Master Data Services Overview Jeremy Kashel Tim Kent Martyn Bullerwell Chapter No.2 "Master Data Services Overview" Master Data Services Overview In this chapter, we will provide an overview of SQL Server 2008 R2 Master Data Services

More information

kalmstrom.com Business Solutions

kalmstrom.com Business Solutions HelpDesk OSP User Manual Content 1 INTRODUCTION... 3 2 REQUIREMENTS... 4 3 THE SHAREPOINT SITE... 4 4 THE HELPDESK OSP TICKET... 5 5 INSTALLATION OF HELPDESK OSP... 7 5.1 INTRODUCTION... 7 5.2 PROCESS...

More information

Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc.

Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc. Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

White Paper Secure Reverse Proxy Server and Web Application Firewall

White Paper Secure Reverse Proxy Server and Web Application Firewall White Paper Secure Reverse Proxy Server and Web Application Firewall 2 Contents 3 3 4 4 8 Losing control Online accessibility means vulnerability Regain control with a central access point Strategic security

More information

Hyperoo 2 User Guide. Hyperoo 2 User Guide

Hyperoo 2 User Guide. Hyperoo 2 User Guide 1 Hyperoo 2 User Guide 1 2 Contents How Hyperoo Works... 3 Installing Hyperoo... 3 Hyperoo 2 Management Console... 4 The Hyperoo 2 Server... 5 Creating a Backup Array... 5 Array Security... 7 Previous

More information

Technical White Paper. Automating the Generation and Secure Distribution of Excel Reports

Technical White Paper. Automating the Generation and Secure Distribution of Excel Reports Technical White Paper Automating the Generation and Secure Distribution of Excel Reports Table of Contents Introduction...3 Creating Spreadsheet Reports: A Cumbersome and Manual Process...3 Distributing

More information

IBM Unica emessage Version 8 Release 6 February 13, 2015. Startup and Administrator's Guide

IBM Unica emessage Version 8 Release 6 February 13, 2015. Startup and Administrator's Guide IBM Unica emessage Version 8 Release 6 February 13, 2015 Startup and Administrator's Guide Note Before using this information and the product it supports, read the information in Notices on page 83. This

More information

User's Guide. ControlPoint. Change Manager (Advanced Copy) SharePoint Migration. v. 4.0

User's Guide. ControlPoint. Change Manager (Advanced Copy) SharePoint Migration. v. 4.0 User's Guide ControlPoint Change Manager (Advanced Copy) SharePoint Migration v. 4.0 Last Updated 7 August 2013 i Contents Preface 3 What's New in Version 4.0... 3 Components... 3 The ControlPoint Central

More information

Best Practices for Trialing the Intronis Cloud Backup and Recovery Solution

Best Practices for Trialing the Intronis Cloud Backup and Recovery Solution Best Practices for Trialing the Intronis Cloud Backup and Recovery Solution Intronis Cloud Backup and Recovery is a file based backup application that allows users to back up their critical data to the

More information

Deploy Remote Desktop Gateway on the AWS Cloud

Deploy Remote Desktop Gateway on the AWS Cloud Deploy Remote Desktop Gateway on the AWS Cloud Mike Pfeiffer April 2014 Last updated: May 2015 (revisions) Table of Contents Abstract... 3 Before You Get Started... 3 Three Ways to Use this Guide... 4

More information

Interwise Connect. Working with Reverse Proxy Version 7.x

Interwise Connect. Working with Reverse Proxy Version 7.x Working with Reverse Proxy Version 7.x Table of Contents BACKGROUND...3 Single Sign On (SSO)... 3 Interwise Connect... 3 INTERWISE CONNECT WORKING WITH REVERSE PROXY...4 Architecture... 4 Interwise Web

More information

Security Development Tool for Microsoft Dynamics AX 2012 WHITEPAPER

Security Development Tool for Microsoft Dynamics AX 2012 WHITEPAPER Security Development Tool for Microsoft Dynamics AX 2012 WHITEPAPER Junction Solutions documentation 2012 All material contained in this documentation is proprietary and confidential to Junction Solutions,

More information

CA XCOM Data Transport Gateway

CA XCOM Data Transport Gateway CA XCOM Data Transport Gateway Release Notes Release 11.6 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

RDS Migration Tool Customer FAQ Updated 7/23/2015

RDS Migration Tool Customer FAQ Updated 7/23/2015 RDS Migration Tool Customer FAQ Updated 7/23/2015 Amazon Web Services is now offering the Amazon RDS Migration Tool a powerful utility for migrating data with minimal downtime from on-premise and EC2-based

More information

Alfresco Enterprise on AWS: Reference Architecture

Alfresco Enterprise on AWS: Reference Architecture Alfresco Enterprise on AWS: Reference Architecture October 2013 (Please consult http://aws.amazon.com/whitepapers/ for the latest version of this paper) Page 1 of 13 Abstract Amazon Web Services (AWS)

More information

In This Guide. Nitro Pro 9 - Deployment Guide

In This Guide. Nitro Pro 9 - Deployment Guide In This Guide Nitro Pro 9 Deployment Guide 3 Customize Your Installation 3 To Customize An Installation Using The Wizard 3 Syntax Example 3 To Customize An Installation Using Orca 4 Syntax Example 4 Customizable

More information

Configuring Apache HTTP Server as a Reverse Proxy Server for SAS 9.3 Web Applications Deployed on Oracle WebLogic Server

Configuring Apache HTTP Server as a Reverse Proxy Server for SAS 9.3 Web Applications Deployed on Oracle WebLogic Server Configuration Guide Configuring Apache HTTP Server as a Reverse Proxy Server for SAS 9.3 Web Applications Deployed on Oracle WebLogic Server This document describes how to configure Apache HTTP Server

More information

owncloud Architecture Overview

owncloud Architecture Overview owncloud Architecture Overview owncloud, Inc. 57 Bedford Street, Suite 102 Lexington, MA 02420 United States phone: +1 (877) 394-2030 www.owncloud.com/contact owncloud GmbH Schloßäckerstraße 26a 90443

More information

Requirement Priority Name Requirement Text Response Comment

Requirement Priority Name Requirement Text Response Comment N-Tiered Architecture Accessibility Application architecture shall consist of a minimum of four tiers: proxy, presentation, application, and data [base]. Each of the fours tiers shall be separated with

More information